New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
Dec 24, 2025Ravie LakshmananMalware / Endpoint Security Cybersecurity researchers have discovered a new variant of a macOS information stealer called...
Dec 24, 2025Ravie LakshmananMalware / Endpoint Security Cybersecurity researchers have discovered a new variant of a macOS information stealer called...
SafeBreach Labs Researchers have developed a zero-click PoC exploit that crashes unpatched Windows Servers using the Windows Lightweight Directory...
19 billion passwords have reportedly been compromised, leading to immediate action recommendations for individuals and organizations. A mega-database with...
Have you ever received a package you never ordered? It could be a warning sign that your data has been...
Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that...
APIs (Application Programming Interfaces) have become the digital backbone of modern enterprises, seamlessly linking mobile applications, cloud platforms, and...
Cybersecurity researchers have disclosed details of a new malicious package on the npm repository that works as a fully functional...
Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate applications to deliver an Android SMS stealer dubbed...
Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly...
Multiple threat groups have been ramping up attacks using a technique called device code phishing to trick users into granting...
Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a distribution vector...
Dec 19, 2025Ravie LakshmananCybercrime / Law Enforcement Authorities in Nigeria have announced the arrest of three "high-profile internet fraud suspects"...
Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools...
Imagine a day where you didn’t have to juggle passwords. No more sticky notes. No more notebooks with dozens of...